Kahoot review Flashcards
NO Operation instructions that slide the program execution to the next memory address are known as
__________ prevents senders from denying they sent the encrypted message.
Non-repudiation
A man in the middle attack, machine in the middle, monkey in the middle attack is when an _______________.
A hacker takes a device and hides malware within it hoping someone finds the device. This is best known as ____________.
Road apple
_______ proves the contents of a message have not been changed since it was sent.
Integrity
_________ sits behind a firewall, adding another layer of analysis, removing any risky content from the data flow.
Intrusion Prevention System (IPS)
_______ will show you the number of lines from the bottom of a file.
Tail
What is it when any access to information is granted to someone who shouldn’t have access to it, such as credentials.
Sensitive Data Exposure
This vulnerability has been around since iOS7. Those in Bluetooth range could reprogram your iPhone.
AirDrop
______ happens when invalid data is sent to the application, intending to make it do something it shouldn’t.
SQL injection
ARP is a protocol that enables network communications and translates IPv$ addresses to IPv6 addresses.
true/false
False
The OG PING utility created in 1983, was used by DARPA to test performance and was called the packet internet groper.
true / false
True
Comparable to a classic firewall; has a choke point router filtering inbound traffic; before the web server and the firewall.
Retina
__________ may make forecasting the address to where a program jumps undoable.
Stack randomization
__________ verifies the origin of the message.
Authentication
Netcat functions as a back-end tool that allows data across a client and server once the connection is established.
true / false
true
Which rootkit infects your hard drive or system BIOS and may even be used to intercept disk-written data?
Hardware or Firmware Rootkits
NDP supplements several IPv4
Host Discovery
There are four categories of IDS. What are they?
__________ is a device that monitors activity to identify questionable or even hostile events.
IDS
NMap can do all but which of the following?
Transfer files
___________ will show you the first 3 lines of a file.
Head
Snort advantages include all of the following except:
It comes confgured for every 0 day attack out there
The ICC contains information about the owner, including the PIN and the PKI digital certificates.
True
A worm strained up to 50 million computers in 2007. What was its name?
Storm
Every Snort rule must have a SID.
true/false
True
In this mode it reads packets off the network and displays them in a stream on your interface.
sniffer mode
The algorithm a node uses to map an IPv6 destination address to a neighbor IPv6 address.
Next hop determination
Which of the following is a PING command
-t PINGS the specified host until stopped
A shell script used to scan system binaries for rootkit alteration.
Chrootkit
Logs all packets to a disk, and can be useful for network traffic debugging.
Packet logger
Pings are mostly used when two hosts have no problem communicating with each other.
true / false
false
An attack used for almost six years before it was found to be a common rootkit attack on Windows 10.
Zacinlo
Stateless firewalls use dynamic filtering.
true / false
True
The two types of DNS queries are iterative and recursive.
true / false
true
Which is not NOP-sled?
Jump sled